XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

XFER is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 734-927-6666 / 800-Get-XFER.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Microsoft Privacy Internet Cloud Saving Money Backup Software Best Practices Managed Service Provider Workplace Tips Small Business Business Computing Hackers Mobile Office Google Productivity Hardware Data Hosted Solutions Mobile Devices VoIP Gadgets Quick Tips Email IT Support Malware Efficiency Network Social Media Business Management Business Continuity Business Server Smartphones Virtualization Upgrade Miscellaneous Innovation IT Services Windows Disaster Recovery Network Security Communication Users Microsoft Office Computer Mobile Device Management Communications Managed IT Services Marketing Android User Tips Passwords WiFi Holiday Browser Alert Vendor Management Smartphone Save Money Remote Monitoring Mobile Computing Windows 10 Operating System Avoiding Downtime Data Backup Bring Your Own Device Apple Information Technology Going Green Remote Computing Outsourced IT BYOD History Computers Chrome Ransomware Telephone Systems IT Solutions Cybercrime The Internet of Things Current Events Best Practice Spam Hacking Health Firewall Application Wireless Technology Trending Social Engineering Phone System Employer-Employee Relationship IT Consultant Big Data Budget App Proactive IT Cloud Computing Data Recovery Collaboration VPN Automation Excel Printer BDR Router Lithium-ion Battery Office Recovery Facebook Bandwidth Money Windows 8 Two-factor Authentication Mobility Cybersecurity How To Business Managament iPhone Fax Server Maintenance Content Filtering Managed IT Services Internet of Things PowerPoint Hard Drives Antivirus Unified Threat Management Outlook Networking Artificial Intelligence Value User Error Customer Relationship Management Business Intelligence Humor Analytics Tutorials Private Cloud Virus Mouse Gmail Digital Payment Computer Repair Downtime Network Congestion Saving Time Search Windows 10 Data Management Office 365 Conferencing Tech Support Administration Retail Data Security Google Drive Social Networking Memory Managed IT Save Time Tablet Phishing Website Redundancy Office Tips Law Enforcement Inbound Marketing Risk Management Apps Compliance Flexibility Point of Sale SaaS Human Resources Workers Biometrics IT service Data storage Hacker IT Management Best Available Internet Exlporer CES Work/Life Balance End of Support HaaS IT Plan Samsung Wearable Technology Robot Meetings Unsupported Software Training Social OneNote Entertainment Physical Security Wireless Programming Data Breach Public Cloud IBM Environment Identity Theft Recycling Mobile Device Running Cable Administrator Document Management Scam Streaming Media Credit Cards Video Surveillance eWaste PDF Piracy Leadership People Spam Blocking Wi-Fi Intranet Safety Government Computer Accessories Webinar DDoS Data Protection Productivity Solid State Drive Bluetooth Word Statistics Vulnerability Black Market Comparison Data Storage Skype Sports Touchscreen Settings Twitter Online Currency Colocation Specifications Data Warehousing Regulations Hiring/Firing LinkedIn IT Security Shadow IT Evernote Co-managed IT WIndows 7 Travel Computer Fan Criminal Computing Infrastructure nternet IaaS Millennials Hosted Solution Worker Commute Servers Wireless Charging Legal Domains Managing Stress Debate FENG Company Culture Monitor Science Workforce Flash PC Care Emails Fiber-Optic Gaming Console YouTube Reputation Software as a Service Content Management Net Neutrality Internet exploMicrosoft File Sharing Tablets Telecommuting eBay Windows Media Player Sync Cables Display NarrowBand Virtual Desktop Alerts Customers Update Education Blockchain Patch Management Advertising Encryption Analyitcs Remote Work Text Messaging Upgrades Software Tips Telephony Crowdfunding Unified Communications Chromecast Customer Service Work Station Consultant Google Docs Staff Notifications Cameras Start Menu Netflix Theft Laptop Macro SharePoint Voice over Internet Protocol Licensing Root Cause Analysis Digital Signature HIPAA Supercomputer Hybrid Cloud Scheduling Print Server Virtual Reality HBO Remote Support Printer Server Mobile Cortana Touchpad Shortcut Relocation User Multi-Factor Security Data loss Keyboard Frequently Asked Questions Knowledge Law Firm IT Bloatware Fraud Augmented Reality Professional Services Google Apps USB Lifestyle Screen Mirroring Tip of the week 3D Entrepreneur Amazon Tools Windows 10s Infrastructure Windows 8.1 Update Charger Hiring/Firing Cast Windows Server 2008 IT Support Uninterrupted Power Supply Cost Management Help Desk Amazon Web Services Password Manager Computer Care Files Distributed Denial of Service 360 Windows 7 Electronic Medical Records Password Webcam Cleaning Instant Messaging Online Shopping Botnet Audit Business Mangement Business Owner Loyalty Troubleshooting Techology Automobile Books Assessment Content Emergency Television Webinar Video Games Audiobook Public Computer Thank You IT solutions Scalability CrashOverride Politics Employer Employee Relationship Transportation Congratulations How to Benefits Worker Smart Technology Rootkit Experience Two Factor Authentication Battery Music Applications

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *